SlideShare une entreprise Scribd logo
1  sur  28
Securing Mobile Services Miguel Ponce de Leon, John Ronan, Jimmy McGibney Telecommunications Software & Systems Group Waterford Institute of Technology Ireland [email_address] Security for the pervasive computing world
Contents ,[object Object],[object Object],[object Object],[object Object]
Security – a difficult problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
m-Government Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General threats & vulnerabilities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Specific Threats to Mobile Services
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Worldwide War Drive 2004
Some tips for wireless LAN security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SEINIT Project ,[object Object],[object Object],[object Object],Security for the pervasive computing world
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],} Classical security just looks at these layers
SEINIT: conceptual approach Space / Geography Instantiation Time UMTS Internet Wi-Fi Bluetooth Interface Interface Interface Virtual Virtual Logical Logical Logical
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Infospheres Security Domains Alice’s personal data Cybercafe Alice’s office Alice’s Bank Alice’s ISP Alice’s Telecom operator Software company – e.g. Microsoft
SEINIT: conceptual approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],SEINIT work in progress
[object Object],[object Object],[object Object],[object Object],[object Object],Intrusion Detection System (IDS)
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Honeypot
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Combining IDS and Honeypots
Collaboration and “reputation”
[object Object],[object Object],[object Object],Collaboration and “reputation”
[object Object],[object Object],[object Object],[object Object],[object Object],Architecture 5 main components
[object Object],[object Object],Architecture 5 main components
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
Architecture 5 main components ,[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Implementation Use available components
SEINIT: other activities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemNikhil Singh
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architectureijsrd.com
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتAmr Rashed
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksInformation Technology
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System Deris Stiawan
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 

Tendances (15)

Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Next Generation Network: Security and Architecture
Next Generation Network: Security and ArchitectureNext Generation Network: Security and Architecture
Next Generation Network: Security and Architecture
 
امن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكاتامن نظم المعلومات وامن الشبكات
امن نظم المعلومات وامن الشبكات
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 
Lect13 security
Lect13   securityLect13   security
Lect13 security
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
1776 1779
1776 17791776 1779
1776 1779
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 

En vedette

Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggiprofman
 
10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every WeekDavid Berkowitz
 
Appunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabAppunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabprofman
 
Power point presentations dos and don’ts
Power point presentations dos and don’tsPower point presentations dos and don’ts
Power point presentations dos and don’tsDaniela Munca-Aftenev
 
Education and Social Inclusion through Information
Education and Social Inclusion through InformationEducation and Social Inclusion through Information
Education and Social Inclusion through InformationSameer Verma
 
Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Francesco Ronchi
 

En vedette (20)

Daidalos Integration Framework TridentCom 2007
Daidalos Integration Framework TridentCom 2007Daidalos Integration Framework TridentCom 2007
Daidalos Integration Framework TridentCom 2007
 
Appunti di Diritto Privato: Saggi
Appunti di Diritto Privato: SaggiAppunti di Diritto Privato: Saggi
Appunti di Diritto Privato: Saggi
 
10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week10 Reasons Why Social Media Week Should Be Every Week
10 Reasons Why Social Media Week Should Be Every Week
 
Appunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlabAppunti di Elaborazione automatica dei dati: matrici e matlab
Appunti di Elaborazione automatica dei dati: matrici e matlab
 
Power point presentations dos and don’ts
Power point presentations dos and don’tsPower point presentations dos and don’ts
Power point presentations dos and don’ts
 
Education and Social Inclusion through Information
Education and Social Inclusion through InformationEducation and Social Inclusion through Information
Education and Social Inclusion through Information
 
A Framework for In-Network Management in Heterogeneous Future Communication N...
A Framework for In-Network Management in Heterogeneous Future Communication N...A Framework for In-Network Management in Heterogeneous Future Communication N...
A Framework for In-Network Management in Heterogeneous Future Communication N...
 
13. wit tssg-efii-arch-jun_2010
13. wit tssg-efii-arch-jun_201013. wit tssg-efii-arch-jun_2010
13. wit tssg-efii-arch-jun_2010
 
Resource Description: : The cornerstone of federation
Resource Description: : The cornerstone of federationResource Description: : The cornerstone of federation
Resource Description: : The cornerstone of federation
 
Physics with Computing what does that mean?
Physics with Computing what does that mean?Physics with Computing what does that mean?
Physics with Computing what does that mean?
 
eChallenges e2006 Large scale interoperability, integrating the Daidalos pro...
eChallenges e2006 Large scale interoperability, integrating  the Daidalos pro...eChallenges e2006 Large scale interoperability, integrating  the Daidalos pro...
eChallenges e2006 Large scale interoperability, integrating the Daidalos pro...
 
Mobile marketing - Italia 2013
Mobile marketing - Italia 2013Mobile marketing - Italia 2013
Mobile marketing - Italia 2013
 
A User Centric Always Best Connected Service Business Model for MVNOs
A User Centric Always Best Connected Service Business Model for MVNOsA User Centric Always Best Connected Service Business Model for MVNOs
A User Centric Always Best Connected Service Business Model for MVNOs
 
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
 
Daidalos Evaluation ECIME 2007
Daidalos Evaluation  ECIME 2007Daidalos Evaluation  ECIME 2007
Daidalos Evaluation ECIME 2007
 
FI PPP Use Case Examples 2011
FI PPP Use Case Examples 2011FI PPP Use Case Examples 2011
FI PPP Use Case Examples 2011
 
PRISTINE: Perfect Pitch Net Futures 2015
PRISTINE: Perfect Pitch Net Futures 2015PRISTINE: Perfect Pitch Net Futures 2015
PRISTINE: Perfect Pitch Net Futures 2015
 
2010 10 19 Open Source Research in FP7 Future Networks
2010 10 19 Open Source Research in FP7 Future Networks2010 10 19 Open Source Research in FP7 Future Networks
2010 10 19 Open Source Research in FP7 Future Networks
 
EU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcherEU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcher
 
TridentCom 2006 paper on the Living Lab approach
TridentCom 2006 paper on the Living Lab approachTridentCom 2006 paper on the Living Lab approach
TridentCom 2006 paper on the Living Lab approach
 

Similaire à Euro mGov Securing Mobile Services

information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Network and web security
Network and web securityNetwork and web security
Network and web securityNitesh Saitwal
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Lancope, Inc.
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressVallie Joseph
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 

Similaire à Euro mGov Securing Mobile Services (20)

eChallenges2005 Seinit
eChallenges2005 SeiniteChallenges2005 Seinit
eChallenges2005 Seinit
 
information security technology
information security technologyinformation security technology
information security technology
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Day4
Day4Day4
Day4
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Honeypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World CongressHoneypots for Cloud Providers - SDN World Congress
Honeypots for Cloud Providers - SDN World Congress
 
Network security
Network security Network security
Network security
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Data security
Data securityData security
Data security
 
NetWitness
NetWitnessNetWitness
NetWitness
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Cloud Computing & Security
Cloud Computing & SecurityCloud Computing & Security
Cloud Computing & Security
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 

Plus de Miguel Ponce de Leon @ TSSG / Waterford Institute of Technology

Plus de Miguel Ponce de Leon @ TSSG / Waterford Institute of Technology (13)

Mooncoin academy form
Mooncoin academy formMooncoin academy form
Mooncoin academy form
 
WebRTC in the Call Centre
WebRTC in the Call CentreWebRTC in the Call Centre
WebRTC in the Call Centre
 
PROSE: Empowering FLOSS in European Projects
PROSE: Empowering FLOSS in European ProjectsPROSE: Empowering FLOSS in European Projects
PROSE: Empowering FLOSS in European Projects
 
EC FIA Activities overview 2011
EC FIA Activities overview 2011EC FIA Activities overview 2011
EC FIA Activities overview 2011
 
RINA: Recursive Inter Network Architecture
RINA: Recursive Inter Network ArchitectureRINA: Recursive Inter Network Architecture
RINA: Recursive Inter Network Architecture
 
4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final
 
Mobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approachMobility Scenarios for the Future Internet: the 4WARD approach
Mobility Scenarios for the Future Internet: the 4WARD approach
 
Services Of LivingLabs and the European Network of Living Labs (ENoLL)
Services Of  LivingLabs and the European Network of Living Labs (ENoLL)Services Of  LivingLabs and the European Network of Living Labs (ENoLL)
Services Of LivingLabs and the European Network of Living Labs (ENoLL)
 
How to Write a Competitive FP7 Proposal
How to Write a Competitive FP7 ProposalHow to Write a Competitive FP7 Proposal
How to Write a Competitive FP7 Proposal
 
EU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcherEU FP7 Perspectives of a researcher
EU FP7 Perspectives of a researcher
 
FITCE 2007 Network Technology Trends Miguelpdl
FITCE 2007 Network Technology Trends MiguelpdlFITCE 2007 Network Technology Trends Miguelpdl
FITCE 2007 Network Technology Trends Miguelpdl
 
Management Of Future Communication Networks And Services
Management Of Future Communication Networks And ServicesManagement Of Future Communication Networks And Services
Management Of Future Communication Networks And Services
 
Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6Experiences of an Irish Researcher in FP6
Experiences of an Irish Researcher in FP6
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Euro mGov Securing Mobile Services

  • 1. Securing Mobile Services Miguel Ponce de Leon, John Ronan, Jimmy McGibney Telecommunications Software & Systems Group Waterford Institute of Technology Ireland [email_address] Security for the pervasive computing world
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.  
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. SEINIT: conceptual approach Space / Geography Instantiation Time UMTS Internet Wi-Fi Bluetooth Interface Interface Interface Virtual Virtual Logical Logical Logical
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.